Ethical egoism is ________. A) not based on reason or logic B) based on determin
ID: 3534791 • Letter: E
Question
Ethical egoism is ________.
A) not based on reason or logic
B) based on determining long-term beneficial consequences
C) the divine command theory by another name
D) Kantianism by another name
E) utilitarianism by another name
2. These are rules of conduct describing what people ought and ought not to do in various situations.
A) ethics
B) ideals
C) morality
D) philosophy
E) virtues
3. What has happened since the first Copyright Act was passed in 1790?
A) Congress has repeatedly increased the number of years of copyright protection
B) Congress has made more kinds of intellectual property protected under copyright
C) Congress has attempted to reconcile American copyright law with European copyright law
D) all of these
E) none of these
4. According to Kant, the moral value of an action depends upon which of these?
A) its consequences
B) the underlying moral rule
C) how closely it aligns with Biblical teachings
D) how closely it aligns with the law
E) the extent to which it produces happiness
5. Why were the mechanical adding machines of Pascal and Leibniz not widely adopted?
A) they were too expensive
B) they were unreliable
C) they were too difficult to program
D) they could not handle fractions
E) bookkeepers successfully lobbied the King, and he made the machines illegal
6. How many Americans were victims of identity theft in 2008 because of their online activities?
A) about 10,000
B) about 100,000
C) about 1 million
D) about 10 million
E) about 100 million
7. The proper noun “Kleenex†is protected how?
A) as a trade secret
B) with a trademark
C) with a patent
D) with a copyright
E) all of these
8. What did Apple’s digital rights management system called FairPlay prevent?
A) songs from being played on more than 5 computers
B) songs from being copied onto CD more than 7 times
C) music purchased from the iTunes Store from playing on non-Apple MP3 players
D) songs from being played on more than 5 computers and being copied onto CD more than 7 times
E) all of these
9. According to James Moore, taking “the ethical point of view†means which of the following?
A) abiding by your religious beliefs
B) deciding that other people and their core values are worthy of your respect
C) choosing to sacrifice your own good for the good of someone else
D) putting your own self interests above those of everyone else
E) refusing to accept help from other people
10. According to John Stuart Mill’s Principle of Harm, the only ground on which the government should intervene in the conduct of an individual is when ________.
A) the individual is breaking the law
B) it would clearly be to the benefit of the individual
C) the individual is under 18 or over 65
D) it would prevent harm to others
E) none of these
11. Many people are now using the Web not simply to download content, but to build communities and upload and share content they have created. This trend has been given what name?
A) persistent online reality
B) online networking
C) Web 2.0
D) interactive hypermedia
E) virtual reality
12. The Enlightment view of addiction believes which of the following?
A) there is nothing wrong with addiction
B) addiction is not real
C) addition can never be overcome by will power alone
D) society is responsible for the bad choices people make
E) people are responsible for the choices they make
13. What is the idea that social and economic inequalities must be the greatest benefit of the least-advantaged member of society?
A) capitalism
B) communism
C) socialism
D) utilitarianism
E) the difference principle
14. Messages embedded in files transferred from one computer to another are commonly called ________.
A) email
B) the World Wide Web
C) software
D) the operating system
E) the Internet
15. A semi-conductor device containing transistors, capacitors and resistors is called ________.
A) a computer
B) a diode
C) a microprocessor
D) a programming language
E) a transformer
16. Which of the following is an argument for ethical egoism?
A) Ethical egoism is supported by versuses in the Bible.
B) People are naturally altruistic.
C) The community can benefit when individuals put their well-being first.
D) It is not true that people naturally act in their own long-term self-interest.
E) Ethical egoism treats all persons as moral equals.
17. Which philosopher argued in The Second Treatise of Government that people have a natural right to property?
A) Jeremy Bentham
B) Immanuel Kant
C) John Locke
D) John Stuart Mill
E) Jean-Jacques Rousseau
18. Which of the following was not an early programming language?
A) BASIC
B) COBOL
C) DATA-FLOW
D) FLOW-MATIC
E) FORTRAN
19. The first commercial electronic digital computers were produced just after which war?
A) the Spanish-American War
B) World War I
C) World War II
D) the Korean War
E) the Vietnam War
20. Sexting refers to which of the following?
A) sending text messages with nude or nearly nude photographs
B) sending emails with nude or nearly nude photographs
C) posting nude or nearly nude photographs to the Web site
D) sending text and emails with nude or nearly nude photographs
E) all of these
21) You are in charge of the computers at a large library. You have been requested to install filtering software that would block Web sites containing various kinds of material deemed inappropriate for children. You have observed this software in action and know that it also blocks many sites that adults might legitimately want to visit. How should you respond to the request to install filtering software?
22)Suppose you work for a company that wants to develop a program that duplicates the functionality of a program made by a competitor. Describe how your company may do this without violation the copyrights held by the competitor.
23? Suppose a society holds that it is wrong for one individual to eavesdrop on the telephone conversations of another citizen. Should that society also prohibit the government from listening in on its citizens’ telephone conversations?
24) Assume you are a professional working in your chosen field of Information Technology. Describe specific things you can do to reduce the impact of illegal copying or sharing of intellectual property by consumers who visit your site or employees within your company who may elicit copyrighted material illegally. How would this differ if you worked for an educational institution and you saw educators copying material for classroom use?
Explanation / Answer
1)B
2)C
3)B
4)B
5)B
6)C
7)E
8)E
9)D
10)D
11)B
12)E
13)A
14)A
15)E
16)B
17)B
18)D
19)C
20)E
21)I will respond in positive way and try to put in such way that the downloads of pornographic videos can be reduced because we know at present there are many proxies and student can use it even after blocking of site. But if put somthing in ip address which will not generate download links for pornographich site and block it .So now when blocked normally and proxies there will be no misuse of net.
22)Great example is apple and Samsung, in the same way if we use device which is developed by our company and whatever generated through that is ours, then by using their information and generating through our device in different way will protect us from copy right.
23)Actually not because that is important to track corrupt people and further govt. is not going to revel your sentiment to public if you are at right position. If we think differently then every coin has two side but depends upon our throwing and calling either head or tail.
24)Now at present we see many new educators who are starting their career in education line and using shophiscated technologies. Due to inexperience and pressure they are force to collect material form any where and classroom material they get easily and that is even under syllabi. But using that for personel use is illegal and punishable act and law should be made more strict so that people fear to copy paste things
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.